scispace - formally typeset
Search or ask a question
Topic

Personal identification number

About: Personal identification number is a research topic. Over the lifetime, 529 publications have been published within this topic receiving 7189 citations. The topic is also known as: PIN number & PIN.


Papers
More filters
Patent
09 Sep 1985
TL;DR: A unitary self-contained card (10) which does not require interaction with a fixed terminal device to prevent monitoring of confidential information contained within the card is presented in this article.
Abstract: A unitary, self-contained card (10) which does not require interaction with a fixed terminal device to prevent monitoring of confidential information contained within the card (10). The unitary, self-contained card (10) has the ability to verify a personal identification number (PIN) which is entered directly into the card by way of a keyboard (12) without the use of an outside terminal and produce a transaction identification code (TIC) which varies for each transactional use of the card (10) and which can later be verified to determine the validity of the transaction. The card (10) is capable of storing issue and expiration dates, credit limit balances and other card transactional data. The card (10) can be used in conjuctions with a validation system (102) with provisions for verifying information recorded on the magnetic indicia (22) of the card (10). The card (10) can also be used with peripheral devices (96) which function to verify the validity of the transation from the transaction identification code (TIC).

525 citations

Patent
02 Jul 1996
TL;DR: In this paper, a system for ascertaining identity of a customer based on a single card carried by the customer is presented, where the card bears a machine-readable code, which is transmitted to a database at a remote location.
Abstract: A system for ascertaining identity of a customer based on a single card carried by the customer. The card bears a machine-readable code, which is transmitted to a database at a remote location. The database locates a record associated with the code, which contains one or more account numbers. Associated with each account number is a Personal Identification Number, PIN. (It is possible that all PINs are identical.) The customer selects an account number, and is asked for a PIN. If the PIN given by the customer matches that of the account number, the customer is concluded to be the valid owner of the account, and a transaction is allowed to proceed.

298 citations

Patent
03 Aug 1994
TL;DR: In this paper, a system and method for preventing counterfeiting of an identification or transaction card, and for verifying that the user of the card is an authorized user, involves the use of a unique, unalterable serial number and an exclusive OR function to generate a private key protected digital signature.
Abstract: A system and method for preventing counterfeiting of an identification or transaction card, and for verifying that the user of the card is an authorized user, involves the use of a unique, unalterable serial number and an exclusive OR function to generate a private key protected digital signature. The digital signature is stored on the card together with a card issuer record which contains sufficient information to authenticate the record. User authentication is provided by a personal identification number which is stored on the card. The personal identification number is generated by enciphering the serial number using a password as the key. The same card can be used to store a plurality of card issuer records, each including its own digital signature, and with user authentication for all records provided by a single personal identification number.

223 citations

Patent
Jerry F. Sloan1
05 Mar 1999
TL;DR: In this paper, a smart card (1208) is inserted into a bank terminal and a lock command is sent from the device to the smart card, and an unlock button is pressed.
Abstract: Locking and unlocking an application in a smart card (1208) allows for automatic authenticity of a lock or unlock command without the need for a personal identification number (PIN). The smart card (1208) is locked and unlocked by using a smart card device (1200, 1200a, 1200b) that need not have a keypad. The smart card device is a dedicated reader and locking/unlocking device, or can be a bank terminal, PC, telephone, etc. The smart card (1208) is inserted into the smart card device (1200, 1200a, 1200b). A lock command is sent from the device to the smart card. An application on the smart card is locked. The smart card (1208) sends identifying information, such as a password (PWD) and a card identification number (CID), to the device (1200) which is stored in a cache (506). The identifying information allows automatic authentication for unlocking of the card at a later time. The locked application cannot be used until it is unlocked. To unlock, the smart card (1208) is inserted into the device (1200) and an unlock button (1204) is pressed. The smart card device reads the card identification number of the card and determines if the corresponding password for that card is present in the cache of the device. If so, an unlock command is issued to the smart card along with the password. If the password received by the smart card matches the password of the smart card then the smart card is unlocked.

213 citations

Patent
03 Oct 1984
TL;DR: In this paper, a personal call communication system is proposed, where a personal identification number is assigned to each telephone user, and an arbitrary person is called by wireless by dialing a corresponding personal calling number.
Abstract: A personal-call communication system wherein a personal identification number is assigned to each telephone user, and an arbitrary person is called by wireless by dialing a corresponding personal calling number. The called person sets an ID-card-type portable device memorizing one's own personal identification information in a card reader of a telephone set, and communicates with the calling party over the wire system via an exchange. The system allows a direct call of an individual person, who in turn has a choice as to whether or not a response should be taken depending on the calling party whose name is indicated to the called party.

196 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
74% related
Server
79.5K papers, 1.4M citations
73% related
Wireless ad hoc network
49K papers, 1.1M citations
73% related
Wireless sensor network
142K papers, 2.4M citations
72% related
Wireless network
122.5K papers, 2.1M citations
71% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20213
20205
201916
201814
201710
201612